6 results (0.014 seconds)

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 1

The Internet Key Exchange v1 main mode is vulnerable to offline dictionary or brute force attacks. Reusing a key pair across different versions and modes of IKE could lead to cross-protocol authentication bypasses. It is well known, that the aggressive mode of IKEv1 PSK is vulnerable to offline dictionary or brute force attacks. For the main mode, however, only an online attack against PSK authentication was thought to be feasible. This vulnerability could allow an attacker to recover a weak Pre-Shared Key or enable the impersonation of a victim host or network. • https://blogs.cisco.com/security/great-cipher-but-where-did-you-get-that-key https://my.f5.com/manage/s/article/K42378447 https://web-in-security.blogspot.com/2018/08/practical-dictionary-attack-on-ipsec-ike.html https://www.kb.cert.org/vuls/id/857035 https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-felsch.pdf • CWE-521: Weak Password Requirements •

CVSS: 5.0EPSS: 6%CPEs: 1EXPL: 0

The Internet Key Exchange version 1 (IKEv1) implementation in the libike library in Solaris 9 and 10 allows remote attackers to cause a denial of service (in.iked daemon crash) via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. • http://secunia.com/advisories/20050 http://securitytracker.com/id?1016043 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102246-1 http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en http://www.securityfocus.com/bid/17902 http://www.vupen.com/english/advisories/2006/1733 https://exchange.xforce.ibmcloud.com/vulnerabilities/26311 •

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

The Internet Key Exchange version 1 (IKEv1) implementation (isakmp_agg.c) in the Shoichi Sakane KAME Project racoon, as used by NetBSD 1.6, 2.x before 20060119, certain FreeBSD releases, and possibly other distributions of BSD or Linux operating systems, when running in aggressive mode, allows remote attackers to cause a denial of service (daemon crash) via crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-003.txt.asc http://mail-index.netbsd.org/source-changes/2006/01/19/0017.html http://secunia.com/advisories/19463 http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp http://www.niscc.gov.uk/niscc/docs/re-20051114-01014.pdf?lang=en •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Multiple unspecified format string vulnerabilities in multiple unspecified implementations of Internet Key Exchange version 1 (IKEv1) have multiple unspecified attack vectors and impacts, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of information in the original sources, it is likely that this candidate will be REJECTed once it is known which implementations are actually vulnerable. • http://jvn.jp/niscc/NISCC-273756/index.html http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp http://www.kb.cert.org/vuls/id/226364 http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Multiple unspecified vulnerabilities in multiple unspecified implementations of Internet Key Exchange version 1 (IKEv1) have multiple unspecified attack vectors and impacts related to denial of service, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of information in the original sources, it is likely that this candidate will be REJECTed once it is known which implementations are actually vulnerable. In addition, since "denial of service" is an impact and not a vulnerability, it is unknown which underlying vulnerabilities are actually covered by this particular candidate. • http://jvn.jp/niscc/NISCC-273756/index.html http://www.ee.oulu.fi/research/ouspg/protos/testing/c09/isakmp http://www.kb.cert.org/vuls/id/226364 http://www.niscc.gov.uk/niscc/docs/br-20051114-01013.html?lang=en •